Chinese APT hackers remotely controlling a victim.

Rating :

Comments

tlawlessat July 04,2015It's clear that there are a number of tools and applications that can be exploited to attack a compromised system. This attack, like most, involved gaining access to the system, moving tools onto the system, collecting data, and then exfiltrating the data to a remote server. The most difficult part of all of this is the access onto the system (for many reasons).

pseagrenat July 07,2015I thought this was a good video, but was rather short and lacked the overall introduction. Over the years Mandiant has produced some interesting material covering foreign agencies attacking US systems and successfully obtaining data. Of course, most of what was shown was a bit simpler than in reality, where it may weeks to find a vulnerable system. If the user does not lock down the ports, then the best Antivirus suite will likely be useless as root access will allow the hacker to take full control of the terminal and bypass other security measures so the files can be obtained and transferred without being noticed.

logybombat July 11,2015I feel like the video provided a lot to scare the viewer, but not much in the way of how to prevent this type of hacking. Maybe the intention was just to report that this was being done, but I think there could have been another 5 minutes of video filled with information on ways these attacks could have been thwarted.

mrgodfrey3at July 14,2015Great video demonstrating the efforts of the CN Govt at hacking into many systems containing IP and sensitive data (ala OPM). Mandiant is at the front and center of these efforts to detect and mitigate these efforts. Short video though. Its much more complex that what was demonstrated.

TimWalshat July 21,2015This was an interesting introduction - I think however this could have maybe been expanded to maybe 15 or 20 minutes to delve a little deeper and spend a little bit more time on certain aspects.
However, this is a fascinating and very relevant topic in modern cyber conflict.